You may think of access control in terms of physical security, but in our increasingly digital world, controlling access to our information assets is becoming more and more important. This article about access control policies will focus on digital assets, but the concepts and processes discussed will apply equally well to physical ones.
This article also assumes that you don’t currently have an accreditation such as ISO 27001, as if you did, you’d already have an Access Control Policy (and one or two more besides that!)
Before we start, let’s talk about policies. When you think about policies (if you ever do!), you might imagine immense wordy documents that are difficult to understand and even harder to follow. I’d like to destroy that idea!
The only value of any policy is in people actually doing what it says. For this to happen, the policy must be:
If any of these criteria aren’t met, the policy will remain as meaningless words in a document and not be worth the digital paper it is written on.
Related guide: How to create policies that work for you and your people
An Access Control Policy informs people on how access to your information and physical assets is controlled. It is not a list of who can see and do what (that would be your Access Control Register) but rather the measures and procedures you have in place to manage and control access.
You might well ask: If we’re not required to, why should we bother to have an Access Control Policy? That’s a fair question! It can be time consuming to create, and you need to train staff on how to use it, so what’s the benefit in having one?
Honestly, having a policy in place isn’t really going to do a great deal. Where the value comes from is in thinking about what assets you have and ensuring only the people who need them can access them. It also allows you to consider security best practices such as the “principle of least privilege” and train your staff on their use.
Essentially, the value comes from the act of writing and implementing the policy, rather than the policy itself.
Before you write an Access Control Policy, you need to consider the assets that you’re wanting to protect. If you don’t yet know what information assets you have, you’ll need to perform a quick audit. Check out the “What should I backup?” section of our recent blog post about business data backup for some tips.
Now that you know what you’re controlling access to, you need to consider a few headlines to include in your Access Control Policy:
Who owns which asset or class of asset and what they are responsible for? For example, your IT Director or Chief Technical Officer (CTO) could be responsible for:
This counts for access by both employees and visitors and could include the following points:
There will come times when a person’s level of access needs to change (for example, as their role changes or they are granted a higher level of seniority). In this vein, you may want to include a point along the lines of:
As myhrtoolkit are ISO 27001 accredited, our Access Control Policy is closely linked with our overarching Information Security Policy. If you don’t currently have a separate Information Security Policy, you may wish to add the following elements into your Access Control Policy:
Related article: Password security: policy and best practices for your organisation
Now that you have a policy, you need to make sure that it’s followed. This means you’ll need to fully train staff on how to use it and then monitor compliance at regular intervals.
But if your new policy isn’t being followed, it’s unlikely to be because your staff are just doing something wrong. My experience is that people want to do the right thing, so if people aren’t using it, the policy and or the training are to blame, not your staff. Consider the following:
With the right policy and correctly trained staff, you’ll be reaping the benefits of greater information security in no time at all!
Information security and HR: creating a security-conscious culture
The benefits of training employees: profit, productivity, people